期刊文献+

一种可自更新Hash链机制 被引量:5

A Self-Renewable Hash Chain Scheme
在线阅读 下载PDF
导出
摘要 针对Hash链应用中有限长度的限制,提出了一种“肩扛式”自更新Hash链机制(SRHC).所提机制具有传统Hash链应用特性的同时,使用基于单向Hash函数的一次签名技术,实现更新Hash链验证锚的平滑、安全的传递,完成Hash链的自更新.证明了所提出机制的安全性完全且只依赖于所配置的Hash函数的安全性.与目前Hash链机制相比,该机制实现了有效、平滑、安全的自更新,同时还有细粒度鉴别、前摄更新等增强安全属性. The finite length of Hash chain limits its applications. Based on one time signature (OTS) technique, a scheme of self-renewable Hash chain (SRHC) is proposed. The proposed scheme not has the whole properties of conventional Hash chains but also renews itself periodically in a secure and smooth way via securely delivering bits of next verification anchor using OTS. A proof is stated to show that SRHC is secure and its security completely relies on the Hash function deployed. Compared with conventional Hash chains, SRHC renews itself efficiently, smoothly and securely and has some enforced security properties such as finer granularity authentication and proactive recovery.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2006年第5期596-599,共4页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金(90204015 60473021) 河南省科技攻关项目(0524220044 0624260017) 河南工业大学科研基金(0401009 050211 050215 050216)资助项目
关键词 HASH链 自更新 一次签名 鉴别 前摄更新 Hash chain self-renewal one-time signature authentication proactive recovery
  • 相关文献

参考文献10

  • 1Hailer N,Metz C, Nesser P,et al. A OneTime Password System. (RFC 2289) [DB/OL]. [2005-10-09].http ://www. ietf . org.
  • 2Ramkumar M, Memon N. An Efficient Key Pre-distribution Scheme for MANET Security [J]. IEEE Journal on Selected Areas of Communication , 2005,13 (3) :611-621.
  • 3Patil V, Shyamasundar R K. An Efficient, Secure and Delegable Micro-Payment System [J]. Information Systems Frontiers, 2005,7(4-5 ):371-389.
  • 4张浩军,祝跃飞.无线局域网认证基础架构研究与设计[C]//第11届全国青年通信学术会议.北京:北京邮电大学出版社,2006:913—918.
  • 5Deng J, Han R, Mishra S. Secure Code Distribution in Dynamically Programmable Wireless Sensor Networks[C]//Proceedings of the Fifth International Conference on Information Processing in Sensor Networks(1PSN' 06). New York, NY, USA: ACM Press,2006:292-300.
  • 6Bicakci K, Baykal N. Infinite Length Hash Chains and Their Applications [C]//Proceedings of IEEE 11th International Workshops on Enabling Technologies(WETICE2002)[C]. Washington, DC, USA: IEEE Computer Society, 2002 : 56-61.
  • 7Pietro R D,Durante A, Mancini L V,et al. Addressing the Shortcomings of One-Way Chains [C]//Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security ( ASIACCS ' 06 ). New York, NY, USA:ACM Press,2006:289-296.
  • 8Goyal V. How To Re-initialize a Hash Chain [DB/OL]. [2005-01-10]. http://eprint.iacr. org/2004/097.pd f .
  • 9Merkle R C. A Certified Digital Signature [C]//Proceedings of the CRYPTO 89. Berlin Germany: Springer-Verlag, LNCS 1990(435):218-238.
  • 10Salem N B, Buttyan L, Hubaux J,et al. Node Cooperation in Hybrid Ad Hoc Networks [J]. IEEE Transactions on Mobile Computing, 2006,5(4): 365-376.

共引文献1

同被引文献31

  • 1黎波涛,罗军舟.Zhou-Gollmann不可否认协议的一种新的改进[J].计算机学报,2005,28(1):35-45. 被引量:9
  • 2柳春雷,谢冬青,秦大力.基于Hash链的流式数据签名与验证研究[J].计算机应用研究,2005,22(4):69-71. 被引量:2
  • 3李保红,侯义斌,赵银亮.一种优化的多播报文认证机制[J].计算机工程,2006,32(1):154-156. 被引量:1
  • 4Hu Yih-Chun, Johnson D B, Perrig A. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks [J]. Ad Hoc Networks, 2003, 1(01): 175-192.
  • 5Perkins C E, Bhagwat P. Highly Dynamic Destination Sequenced Distance-Vector Routing(DSDV) for Mobile Computers [C]//IEEE. In Proceedinds of SIGCOMM ' 94 Conference on Communications Architectures, Protocols ans Applications. London, United kingdom: ACM, 1994:234-244.
  • 6Lin Chun-Hsing, Lai Wei Shen, HuangYen Lin, et al. 1-SEAD:A Secure Routing Protocol for Mobile Ad Hoc Networks [C]//IEEE. 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008. Busan:[s.n.],2008:102 107.
  • 7MOHAN S.Privacy and authentication protocols for PCS[J].IEEE personal communications magazine,1996,3(5):34-38.
  • 8HARN L,LIN H.Modifications to enhance the security of GSM[C]// Proceedings of 5th Nat Conference on Information Security.Taiwan,1995:97-100.
  • 9FRANKEL Y,HERZBERG A.Security issues in a CDPD wireless network[J].IEEE Personal communications magazine,1995,2(4):16-27.
  • 10REVEST R,SHAMIR A.Payword and micromint:Two simple micro -payment protocols[C]// Proceedings of Security Protocols,LNCS 1189.Berlin:Springer-Verlag,1996:69-88.

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部